mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 02:02:43 +00:00
* audit file sink node * Added options for file sink, updated tests, * Ported benchmark for file * tests
416 lines
12 KiB
Go
416 lines
12 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
package event
|
|
|
|
import (
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
|
|
|
vaultaudit "github.com/hashicorp/vault/audit"
|
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
|
|
|
"github.com/hashicorp/eventlogger"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
// TestAuditFileSink_Type ensures that the node is a 'sink' type.
|
|
func TestAuditFileSink_Type(t *testing.T) {
|
|
f, err := NewAuditFileSink(t.TempDir(), AuditFormatJSON)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, f)
|
|
require.Equal(t, eventlogger.NodeTypeSink, f.Type())
|
|
}
|
|
|
|
// TestNewAuditFileSink tests creation of an AuditFileSink.
|
|
func TestNewAuditFileSink(t *testing.T) {
|
|
tests := map[string]struct {
|
|
IsTempDirPath bool // Path should contain the filename if temp dir is true
|
|
Path string
|
|
Format auditFormat
|
|
Options []Option
|
|
IsErrorExpected bool
|
|
ExpectedErrorMessage string
|
|
// Expected values of AuditFileSink
|
|
ExpectedFileMode os.FileMode
|
|
ExpectedFormat auditFormat
|
|
ExpectedPath string
|
|
ExpectedPrefix string
|
|
}{
|
|
"default-values": {
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.NewAuditFileSink: path is required",
|
|
},
|
|
"spacey-path": {
|
|
Path: " ",
|
|
Format: AuditFormatJSON,
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.NewAuditFileSink: path is required",
|
|
},
|
|
"bad-format": {
|
|
Path: "qwerty",
|
|
Format: "squirrels",
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.NewAuditFileSink: invalid format: event.(auditFormat).validate: 'squirrels' is not a valid format: invalid parameter",
|
|
},
|
|
"path-not-exist-valid-format-file-mode": {
|
|
Path: "qwerty",
|
|
Format: AuditFormatJSON,
|
|
Options: []Option{WithFileMode("00755")},
|
|
IsErrorExpected: false,
|
|
ExpectedPath: "qwerty",
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedPrefix: "",
|
|
ExpectedFileMode: os.FileMode(0o755),
|
|
},
|
|
"valid-path-no-format": {
|
|
IsTempDirPath: true,
|
|
Path: "vault.log",
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.NewAuditFileSink: invalid format: event.(auditFormat).validate: '' is not a valid format: invalid parameter",
|
|
},
|
|
"valid-path-and-format": {
|
|
IsTempDirPath: true,
|
|
Path: "vault.log",
|
|
Format: AuditFormatJSON,
|
|
IsErrorExpected: false,
|
|
ExpectedFileMode: defaultFileMode,
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedPrefix: "",
|
|
},
|
|
"file-mode-not-default-or-zero": {
|
|
Path: "vault.log",
|
|
Format: AuditFormatJSON,
|
|
Options: []Option{WithFileMode("0007")},
|
|
IsTempDirPath: true,
|
|
IsErrorExpected: false,
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedPrefix: "",
|
|
ExpectedFileMode: 0o007,
|
|
},
|
|
"path-stdout": {
|
|
Path: "stdout",
|
|
Format: AuditFormatJSON,
|
|
Options: []Option{WithFileMode("0007")}, // Will be ignored as stdout
|
|
IsTempDirPath: false,
|
|
IsErrorExpected: false,
|
|
ExpectedPath: "stdout",
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedPrefix: "",
|
|
ExpectedFileMode: defaultFileMode,
|
|
},
|
|
"path-discard": {
|
|
Path: "discard",
|
|
Format: AuditFormatJSON,
|
|
Options: []Option{WithFileMode("0007")},
|
|
IsTempDirPath: false,
|
|
IsErrorExpected: false,
|
|
ExpectedPath: "discard",
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedPrefix: "",
|
|
ExpectedFileMode: defaultFileMode,
|
|
},
|
|
"prefix": {
|
|
IsTempDirPath: true,
|
|
Path: "vault.log",
|
|
Format: AuditFormatJSON,
|
|
Options: []Option{WithFileMode("0007"), WithPrefix("bleep")},
|
|
IsErrorExpected: false,
|
|
ExpectedPrefix: "bleep",
|
|
ExpectedFormat: AuditFormatJSON,
|
|
ExpectedFileMode: 0o007,
|
|
},
|
|
}
|
|
|
|
for name, tc := range tests {
|
|
name := name
|
|
tc := tc
|
|
t.Run(name, func(t *testing.T) {
|
|
// t.Parallel()
|
|
|
|
// If we need a real directory as a path we can use a temp dir.
|
|
// but we should keep track of it for comparison in the new sink.
|
|
var tempDir string
|
|
tempPath := tc.Path
|
|
if tc.IsTempDirPath {
|
|
tempDir = t.TempDir()
|
|
tempPath = filepath.Join(tempDir, tempPath)
|
|
}
|
|
|
|
sink, err := NewAuditFileSink(tempPath, tc.Format, tc.Options...)
|
|
|
|
switch {
|
|
case tc.IsErrorExpected:
|
|
require.Error(t, err)
|
|
require.EqualError(t, err, tc.ExpectedErrorMessage)
|
|
require.Nil(t, sink)
|
|
default:
|
|
require.NoError(t, err)
|
|
require.NotNil(t, sink)
|
|
|
|
// Assert properties are correct.
|
|
require.Equal(t, tc.ExpectedPrefix, sink.prefix)
|
|
require.Equal(t, tc.ExpectedFormat, sink.format)
|
|
require.Equal(t, tc.ExpectedFileMode, sink.fileMode)
|
|
|
|
switch {
|
|
case tc.IsTempDirPath:
|
|
require.Equal(t, tempPath, sink.path)
|
|
default:
|
|
require.Equal(t, tc.ExpectedPath, sink.path)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestAuditFileSink_Reopen tests that the sink reopens files as expected when requested to.
|
|
// stdout and discard paths are ignored.
|
|
// see: https://developer.hashicorp.com/vault/docs/audit/file#file_path
|
|
func TestAuditFileSink_Reopen(t *testing.T) {
|
|
tests := map[string]struct {
|
|
Path string
|
|
IsTempDirPath bool
|
|
ShouldCreateFile bool
|
|
Options []Option
|
|
IsErrorExpected bool
|
|
ExpectedErrorMessage string
|
|
ExpectedFileMode os.FileMode
|
|
}{
|
|
// Should be ignored by Reopen
|
|
"discard": {
|
|
Path: "discard",
|
|
},
|
|
// Should be ignored by Reopen
|
|
"stdout": {
|
|
Path: "stdout",
|
|
},
|
|
"permission-denied": {
|
|
Path: "/tmp/vault/test/foo.log",
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.(AuditFileSink).open: unable to create file \"/tmp/vault/test/foo.log\": mkdir /tmp/vault/test: permission denied",
|
|
},
|
|
"happy": {
|
|
Path: "vault.log",
|
|
IsTempDirPath: true,
|
|
ExpectedFileMode: os.FileMode(defaultFileMode),
|
|
},
|
|
"filemode-existing": {
|
|
Path: "vault.log",
|
|
IsTempDirPath: true,
|
|
ShouldCreateFile: true,
|
|
Options: []Option{WithFileMode("0000")},
|
|
ExpectedFileMode: os.FileMode(defaultFileMode),
|
|
},
|
|
}
|
|
|
|
for name, tc := range tests {
|
|
name := name
|
|
tc := tc
|
|
t.Run(name, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
// If we need a real directory as a path we can use a temp dir.
|
|
// but we should keep track of it for comparison in the new sink.
|
|
var tempDir string
|
|
tempPath := tc.Path
|
|
if tc.IsTempDirPath {
|
|
tempDir = t.TempDir()
|
|
tempPath = filepath.Join(tempDir, tc.Path)
|
|
}
|
|
|
|
// If the file mode is 0 then we will need a pre-created file to stat.
|
|
// Only do this for paths that are not 'special keywords'
|
|
if tc.ShouldCreateFile && tc.Path != discard && tc.Path != stdout {
|
|
f, err := os.OpenFile(tempPath, os.O_CREATE, defaultFileMode)
|
|
require.NoError(t, err)
|
|
defer func() {
|
|
err = os.Remove(f.Name())
|
|
require.NoError(t, err)
|
|
}()
|
|
}
|
|
|
|
sink, err := NewAuditFileSink(tempPath, AuditFormatJSON, tc.Options...)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, sink)
|
|
|
|
err = sink.Reopen()
|
|
|
|
switch {
|
|
case tc.IsErrorExpected:
|
|
require.Error(t, err)
|
|
require.EqualError(t, err, tc.ExpectedErrorMessage)
|
|
case tempPath == discard:
|
|
require.NoError(t, err)
|
|
case tempPath == stdout:
|
|
require.NoError(t, err)
|
|
default:
|
|
require.NoError(t, err)
|
|
info, err := os.Stat(tempPath)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, info)
|
|
require.Equal(t, tc.ExpectedFileMode, info.Mode())
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// TestAuditFileSink_Process ensures that Process behaves as expected.
|
|
func TestAuditFileSink_Process(t *testing.T) {
|
|
tests := map[string]struct {
|
|
Path string
|
|
Format auditFormat
|
|
Data *logical.LogInput
|
|
ShouldIgnoreFormat bool
|
|
ShouldUseNilEvent bool
|
|
IsErrorExpected bool
|
|
ExpectedErrorMessage string
|
|
}{
|
|
"discard": {
|
|
Path: discard,
|
|
Format: AuditFormatJSON,
|
|
Data: &logical.LogInput{Request: &logical.Request{ID: "123"}},
|
|
IsErrorExpected: false,
|
|
},
|
|
"stdout": {
|
|
Path: stdout,
|
|
Format: AuditFormatJSON,
|
|
Data: &logical.LogInput{Request: &logical.Request{ID: "123"}},
|
|
IsErrorExpected: false,
|
|
},
|
|
"no-formatted-data": {
|
|
Path: "/dev/null",
|
|
Format: AuditFormatJSON,
|
|
Data: &logical.LogInput{Request: &logical.Request{ID: "123"}},
|
|
ShouldIgnoreFormat: true,
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.(AuditFileSink).Process: unable to retrieve event formatted as \"json\"",
|
|
},
|
|
"nil": {
|
|
Path: "/dev/null",
|
|
Format: AuditFormatJSON,
|
|
Data: &logical.LogInput{Request: &logical.Request{ID: "123"}},
|
|
ShouldUseNilEvent: true,
|
|
IsErrorExpected: true,
|
|
ExpectedErrorMessage: "event.(AuditFileSink).Process: event is nil: invalid parameter",
|
|
},
|
|
}
|
|
|
|
for name, tc := range tests {
|
|
name := name
|
|
tc := tc
|
|
t.Run(name, func(t *testing.T) {
|
|
// Setup a formatter
|
|
cfg := vaultaudit.FormatterConfig{}
|
|
ss := newStaticSalt(t)
|
|
formatter, err := NewAuditFormatterJSON(cfg, ss)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, formatter)
|
|
|
|
// Setup a sink
|
|
sink, err := NewAuditFileSink(tc.Path, tc.Format)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, sink)
|
|
|
|
// Generate a fake event
|
|
ctx := namespace.RootContext(nil)
|
|
event := fakeJSONAuditEvent(t, AuditRequest, tc.Data)
|
|
require.NotNil(t, event)
|
|
|
|
// Finesse the event into the correct shape.
|
|
event, err = formatter.Process(ctx, event)
|
|
require.NoError(t, err)
|
|
require.NotNil(t, event)
|
|
|
|
// Some conditional stuff 'per test' to exercise different parts of Process.
|
|
if tc.ShouldIgnoreFormat {
|
|
delete(event.Formatted, tc.Format.String())
|
|
}
|
|
|
|
if tc.ShouldUseNilEvent {
|
|
event = nil
|
|
}
|
|
|
|
// The actual exercising of the sink.
|
|
event, err = sink.Process(ctx, event)
|
|
switch {
|
|
case tc.IsErrorExpected:
|
|
require.Error(t, err)
|
|
require.EqualError(t, err, tc.ExpectedErrorMessage)
|
|
require.Nil(t, event)
|
|
default:
|
|
require.NoError(t, err)
|
|
require.Nil(t, event)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
// BenchmarkAuditFileSink_Process benchmarks the AuditFormatterJSON and then AuditFileSink calling Process.
|
|
// This should replicate the original benchmark testing which used to perform both of these roles together.
|
|
func BenchmarkAuditFileSink_Process(b *testing.B) {
|
|
// Base input
|
|
in := &logical.LogInput{
|
|
Auth: &logical.Auth{
|
|
ClientToken: "foo",
|
|
Accessor: "bar",
|
|
EntityID: "foobarentity",
|
|
DisplayName: "testtoken",
|
|
NoDefaultPolicy: true,
|
|
Policies: []string{"root"},
|
|
TokenType: logical.TokenTypeService,
|
|
},
|
|
Request: &logical.Request{
|
|
Operation: logical.UpdateOperation,
|
|
Path: "/foo",
|
|
Connection: &logical.Connection{
|
|
RemoteAddr: "127.0.0.1",
|
|
},
|
|
WrapInfo: &logical.RequestWrapInfo{
|
|
TTL: 60 * time.Second,
|
|
},
|
|
Headers: map[string][]string{
|
|
"foo": {"bar"},
|
|
},
|
|
},
|
|
}
|
|
|
|
ctx := namespace.RootContext(nil)
|
|
|
|
// Create the formatter node.
|
|
cfg := vaultaudit.FormatterConfig{}
|
|
ss := newStaticSalt(b)
|
|
formatter, err := NewAuditFormatterJSON(cfg, ss)
|
|
require.NoError(b, err)
|
|
require.NotNil(b, formatter)
|
|
|
|
// Create the sink node.
|
|
sink, err := NewAuditFileSink("/dev/null", AuditFormatJSON)
|
|
require.NoError(b, err)
|
|
require.NotNil(b, sink)
|
|
|
|
// Generate the event
|
|
event := fakeJSONAuditEvent(b, AuditRequest, in)
|
|
require.NotNil(b, event)
|
|
|
|
b.ResetTimer()
|
|
b.RunParallel(func(pb *testing.PB) {
|
|
for pb.Next() {
|
|
event, err = formatter.Process(ctx, event)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
_, err := sink.Process(ctx, event)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
})
|
|
}
|